Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    An Asset-Based Approach to Mitigate Zero-Day Ransomware Attacks

    Farag Azzedin*, Husam Suwad, Md Mahfuzur Rahman

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3003-3020, 2022, DOI:10.32604/cmc.2022.028646

    Abstract This article presents an asset-based security system where security practitioners build their systems based on information they own and not solicited by observing attackers’ behavior. Current security solutions rely on information coming from attackers. Examples are current monitoring and detection security solutions such as intrusion prevention/detection systems and firewalls. This article envisions creating an imbalance between attackers and defenders in favor of defenders. As such, we are proposing to flip the security game such that it will be led by defenders and not attackers. We are proposing a security system that does not observe the behavior of the attack. On… More >

  • Open Access

    ARTICLE

    Network Security Situation Awareness Framework based on Threat Intelligence

    Hongbin Zhang1, 2, Yuzi Yi1, *, Junshe Wang1, Ning Cao3, *, Qiang Duan4

    CMC-Computers, Materials & Continua, Vol.56, No.3, pp. 381-399, 2018, DOI: 10.3970/cmc.2018.03787

    Abstract Network security situation awareness is an important foundation for network security management, which presents the target system security status by analyzing existing or potential cyber threats in the target system. In network offense and defense, the network security state of the target system will be affected by both offensive and defensive strategies. According to this feature, this paper proposes a network security situation awareness method using stochastic game in cloud computing environment, uses the utility of both sides of the game to quantify the network security situation value. This method analyzes the nodes based on the network security state of… More >

Displaying 1-10 on page 1 of 2. Per Page